The Method of Types

Total Page:16

File Type:pdf, Size:1020Kb

The Method of Types IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 6, OCTOBER 1998 2505 The Method of Types Imre Csiszar,´ Fellow, IEEE (Invited Paper) Abstract— The method of types is one of the key technical the “random coding” upper bound and the “sphere packing” tools in Shannon Theory, and this tool is valuable also in other lower bound to the error probability of the best code of a given fields. In this paper, some key applications will be presented in rate less than capacity (Fano [44], Gallager [46], Shannon, sufficient detail enabling an interested nonspecialist to gain a working knowledge of the method, and a wide selection of fur- Gallager, and Berlekamp [74]). These bounds exponentially ther applications will be surveyed. These range from hypothesis coincide for rates above a “critical rate” and provide the exact testing and large deviations theory through error exponents for error exponent of a DMC for such rates. These results could discrete memoryless channels and capacity of arbitrarily varying not be obtained via typical sequences, and their first proofs channels to multiuser problems. While the method of types is suitable primarily for discrete memoryless models, its extensions used analytic techniques that gave little insight. to certain models with memory will also be discussed. It turned out in the 1970’s that a simple refinement of the typical sequence approach is effective—at least in the discrete Index Terms—Arbitrarily varying channels, choice of decoder, counting approach, error exponents, extended type concepts, memoryless context—also for error exponents, as well as for hypothesis testing, large deviations, multiuser problems, universal situations where the probabilistic model is partially unknown. coding. The idea of this refinement, known as the method of types, is to partition the -length sequences into classes according to type (empirical distribution). Then the error event of interest is I. INTRODUCTION partitioned into its intersections with the type classes, and the NE of Shannon’s key discoveries was that—for quite error probability is obtained by summing the probabilities of Ogeneral source models—the negative logarithm of the these intersections. The first key fact is that the number of type probability of a typical long sequence divided by the number of classes grows subexponentially with . This implies that the symbols is close to the source entropy ; the total probability error probability has the same exponential asymptotics as the of all -length sequences not having this property is arbitrarily largest one among the probabilities of the above intersections. small if is large. Thus “it is possible for most purposes The second key fact is that sequences of the same type are to treat long sequences as though there were just of equiprobable under a memoryless probabilistic model. Hence them, each with a probability ” [75, p. 24]. Shannon to bound the probabilities of intersections as above it suffices demonstrated the power of this idea also in the context of to bound their cardinalities, which is often quite easy. This channels. It should be noted that Shannon [75] used the term informal description assumes models involving one set of “typical sequence” in an intuitive rather than technical sense. sequences (source coding or hypothesis testing); if two or more Formal definitions of typicality, introduced later, need not sets of sequences are involved (as in channel coding), joint concern us here. types have to be considered. At the first stage of development of information theory, the In this paper, we will illustrate the working and the power main theoretical issue was to find the best rates of source of the method of types via a sample of examples that the or channel block codes that, assuming a known probabilistic author considers typical and both technically and historically model, guarantee arbitrarily small probability of error (or toler- interesting. The simple technical background, including con- able average distortion) when the blocklength is sufficiently venient notation, will be introduced in Section II. The first large. For this purpose, covered by the previous quotation from key applications, viz. universally attainable exponential error Shannon [75], typical sequences served as a very efficient and bounds for hypothesis testing and channel block-coding, will intuitive tool, as demonstrated by the book of Wolfowitz [81]. be treated in Sections III and IV, complete with proofs. The The limitations of this tool became apparent when interest universally attainable error exponent for source block-coding shifted towards the speed of convergence to zero of the error arises as a special case of the hypothesis testing result. A probability as . Major achievements of the 1960’s were, in the context of discrete memoryless channels (DMC’s), basic result of large deviations theory is also included in Section III. Section V is devoted to the arbitrarily varying channel (AVC) capacity problem. Here proofs could not be Manuscript received December 16, 1997; revised April 20, 1998. This work given in full, but the key steps are reproduced in detail was supported by the Hungarian National Foundation for Scientific Research showing how the results were actually obtained and how under Grant T016386. naturally the method of types suggested a good decoder. Other The author is with the Mathematical Institute of the Hungarian Academy of Sciences, H1364 Budapest, P.O. Box 127, Hungary. typical applications are reviewed in Section VI, including Publisher Item Identifier S 0018-9448(98)05285-7. rate-distortion theory, source-channel error exponents, and 0018–9448/98$10.00 © 1998 IEEE 2506 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 6, OCTOBER 1998 multiuser problems. Although the method of types is tailored divergence, i.e., to discrete memoryless models, there exist extensions of the type concept suitable for certain models with memory. These will be discussed in Section VII. The selection of problems and results treated in this paper has been inevitably subjective. To survey all applications of the method of types would have required a paper the size of a book. In particular, several important applications in with the standard conventions that , Combinatorics are not covered, in this respect the reader if . Here and in the sequel the base should consult the paper of Korner¨ and Orlitsky in this issue. of and of is arbitrary but the same; the usual choices While historical aspects were taken seriously, and a rather are or . large list of references has been included, no attempts were The type of a sequence and the joint made to give a detailed account of the history of the method type of and are the PD’s of types. About its origins let us just make the following brief and defined by letting and be comments. the relative frequency of among and of The ingredients have been around for a long time. In among , respectively, for all , probability theory, they appear in the basic papers of Sanov . Joint types of several -length sequences are defined [72] and Hoeffding [53] on large deviations, cf. Section similarly. The subset of consisting of the possible types III below. A similar counting approach had been used in of sequences is denoted by . statistical physics even earlier, dating back to Boltzmann Lemma II.1: [18]. A remarkable example is the paper of Schrodinger¨ [73] that predates modern large deviations theory but remained unknown outside the physics community until recently. Infor- mation theorists have also used ideas now considered pertinent Proof: Elementary combinatorics. to the method of types. Fano’s [44] approach to the DMC error exponent problem was based on “constant composition codes,” The probability that independent drawings from a PD and Berger’s [13] extension of the rate-distortion theorem to give , is denoted by . Similarly, the sources with partially known and variable statistics relied upon probability of receiving when is sent over his key lemma about covering a type class. Later, in the 1970’s, a DMC with matrix , is denoted by . Clearly, if several authors made substantial use of the concept now called have type and have joint type joint type, including Blahut [16], Dobrushin and Stambler [40], and Goppa [48]. While the ideas of the method of types were already around (II.1) in the 1970’s, this author believes that his research group is fairly credited for developing them to a general method, indeed, to a basic tool of the information theory of discrete memoryless systems. The key coworkers were Janos´ Korner¨ (II.2) and Katalin Marton. A systematic development appears in the book of Csiszar´ and Korner¨ [30]. Were that book written now, Here is defined for any by both authors would prefer to rely even more extensively on types, rather than typical sequences. Indeed, while “merging nearby types, i.e., the formalism of typical sequences has (II.3) the advantage of shortening computations” [30, p. 38], that where denotes the -marginal of . advantage is relatively minor in the discrete memoryless We will write , respectively , to denote context. On the other hand, the less delicate “typical sequence” that or is for each or with approach is more robust, it can be extended also to those or respectively. The divergences in models with memory or continuous alphabets for which the (II.1) and (II.2) are finite iff , respectively, . type idea apparently fails. For , the type class will be denoted by . Similarly, for we write : , , . II. TECHNICAL BACKGROUND The technical background of the method of types is very Lemma II.2: For any type simple. In the author’s information theory classes, the lemmas (II.4) below are part of the introductory material. will denote finite sets, unless stated otherwise; and for any PD the size of is denoted by . The set of all probability distributions (PD’s) on is denoted by .
Recommended publications
  • Digital Communication Systems 2.2 Optimal Source Coding
    Digital Communication Systems EES 452 Asst. Prof. Dr. Prapun Suksompong [email protected] 2. Source Coding 2.2 Optimal Source Coding: Huffman Coding: Origin, Recipe, MATLAB Implementation 1 Examples of Prefix Codes Nonsingular Fixed-Length Code Shannon–Fano code Huffman Code 2 Prof. Robert Fano (1917-2016) Shannon Award (1976 ) Shannon–Fano Code Proposed in Shannon’s “A Mathematical Theory of Communication” in 1948 The method was attributed to Fano, who later published it as a technical report. Fano, R.M. (1949). “The transmission of information”. Technical Report No. 65. Cambridge (Mass.), USA: Research Laboratory of Electronics at MIT. Should not be confused with Shannon coding, the coding method used to prove Shannon's noiseless coding theorem, or with Shannon–Fano–Elias coding (also known as Elias coding), the precursor to arithmetic coding. 3 Claude E. Shannon Award Claude E. Shannon (1972) Elwyn R. Berlekamp (1993) Sergio Verdu (2007) David S. Slepian (1974) Aaron D. Wyner (1994) Robert M. Gray (2008) Robert M. Fano (1976) G. David Forney, Jr. (1995) Jorma Rissanen (2009) Peter Elias (1977) Imre Csiszár (1996) Te Sun Han (2010) Mark S. Pinsker (1978) Jacob Ziv (1997) Shlomo Shamai (Shitz) (2011) Jacob Wolfowitz (1979) Neil J. A. Sloane (1998) Abbas El Gamal (2012) W. Wesley Peterson (1981) Tadao Kasami (1999) Katalin Marton (2013) Irving S. Reed (1982) Thomas Kailath (2000) János Körner (2014) Robert G. Gallager (1983) Jack KeilWolf (2001) Arthur Robert Calderbank (2015) Solomon W. Golomb (1985) Toby Berger (2002) Alexander S. Holevo (2016) William L. Root (1986) Lloyd R. Welch (2003) David Tse (2017) James L.
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 63, No. 3, September 2013 Editor: Tara Javidi ISSN 1059-2362 Editorial committee: Ioannis Kontoyiannis, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, and Sergio Verdú Annual Awards Announced The main annual awards of the • 2013 IEEE Jack Keil Wolf ISIT IEEE Information Theory Society Student Paper Awards were were announced at the 2013 ISIT selected and announced at in Istanbul this summer. the banquet of the Istanbul • The 2014 Claude E. Shannon Symposium. The winners were Award goes to János Körner. the following: He will give the Shannon Lecture at the 2014 ISIT in 1) Mohammad H. Yassaee, for Hawaii. the paper “A Technique for Deriving One-Shot Achiev - • The 2013 Claude E. Shannon ability Results in Network Award was given to Katalin János Körner Daniel Costello Information Theory”, co- Marton in Istanbul. Katalin authored with Mohammad presented her Shannon R. Aref and Amin A. Gohari Lecture on the Wednesday of the Symposium. If you wish to see her slides again or were unable to attend, a copy of 2) Mansoor I. Yousefi, for the paper “Integrable the slides have been posted on our Society website. Communication Channels and the Nonlinear Fourier Transform”, co-authored with Frank. R. Kschischang • The 2013 Aaron D. Wyner Distinguished Service Award goes to Daniel J. Costello. • Several members of our community became IEEE Fellows or received IEEE Medals, please see our web- • The 2013 IT Society Paper Award was given to Shrinivas site for more information: www.itsoc.org/honors Kudekar, Tom Richardson, and Rüdiger Urbanke for their paper “Threshold Saturation via Spatial Coupling: The Claude E.
    [Show full text]
  • Information Theory: Coding Theorems for Discrete Memoryless Systems Imre Csiszár and János Körner Frontmatter More Information
    Cambridge University Press 978-0-521-19681-9 - Information Theory: Coding Theorems for Discrete Memoryless Systems Imre Csiszár and János Körner Frontmatter More information Information Theory Coding Theorems for Discrete Memoryless Systems This book is widely regarded as a classic in the field of information theory, providing deep insights and expert treatment of the key theoretical issues. It includes in-depth coverage of the mathematics of reliable information transmission, both in two-terminal and multi-terminal network scenarios. Updated and considerably expanded, this new edition presents unique discussions of information-theoretic secrecy and of zero-error information theory, including substantial connections of the latter with extremal com- binatorics. The presentations of all core subjects are self-contained, even the advanced topics, which helps readers to understand the important connections between seemingly different problems. Finally, 320 end-of-chapter problems, together with helpful solving hints, allow readers to develop a full command of the mathematical techniques. This is an ideal resource for graduate students and researchers in electrical and electronic engineering, computer science, and applied mathematics. Imre Csiszár is a Research Professor at the Alfréd Rényi Institute of Mathematics of the Hungarian Academy of Sciences, where he has worked since 1961. He is also Pro- fessor Emeritus of the University of Technology and Economics, Budapest, a Fellow of the IEEE, and former President of the Hungarian Mathematical Society. He has received numerous awards, including the Shannon Award of the IEEE Information Theory Society (1996). János Körner is a Professor of Computer Science at the Sapienza University of Rome, Italy, where he has worked since 1992.
    [Show full text]
  • Concentration of Measure Inequalities in Information Theory, Communications, and Coding
    Full text available at: http://dx.doi.org/10.1561/0100000064 Concentration of Measure Inequalities in Information Theory, Communications, and Coding Maxim Raginsky Department of Electrical and Computer Engineering Coordinated Science Laboratory University of Illinois at Urbana-Champaign Urbana, IL 61801, USA [email protected] Igal Sason Department of Electrical Engineering Technion – Israel Institute of Technology Haifa 32000, Israel [email protected] Boston — Delft Full text available at: http://dx.doi.org/10.1561/0100000064 Foundations and Trends R in Communications and Information Theory Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is M. Raginsky and I. Sason. Concentration of Measure Inequalities in Information Theory, Communications, and Coding. Foundations and Trends R in Communications and Information Theory, vol. 10, no. 1-2, pp. 1–247, 2013. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-60198-725-9 c 2013 M. Raginsky and I. Sason All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Cen- ter, Inc., 222 Rosewood Drive, Danvers, MA 01923.
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 70, No. 3, September 2020 EDITOR: Salim El Rouayheb ISSN 1059-2362 President’s Column Aylin Yener We are quickly approaching the end of sum- experience from these reputed information mer and the reopening of campuses at least theorists. I am pleased to report that our Dis- across the US. As I write this, I find myself tinguished Lecturer program, is gearing up looking at the same view as I was when writ- to be back on, but with virtual lectures. The ing the previous columns, with perhaps a Board of Governors has extended the terms slight change (for the better) in the tempera- of the current lecturers by a year so that when ture and a new end-of-the summer breeze traveling resumes, the lecturers will have the that makes sitting in my balcony so much bet- opportunity to re-coupe the lost year in in- ter. I feel lucky once again to have an outdoor person chapter visits. For now, all chapters space; one I came to treasure much more than should consider inviting the lecturers for on- I did in BC (Before COVID). I realize I have line lectures, which can be facilitated on zoom forgotten the view from the office I got to sit or webex. I hope that the chapters and our in no more than ten days before the closure members will find this resource useful. in March and try to recall -to no avail- if any part of the city skyline was visible. I should We are continuing to live our lives online (al- have taken pictures I conclude.
    [Show full text]
  • Principles of Communications ECS 332
    Principles of Communications ECS 332 Asst. Prof. Dr. Prapun Suksompong (ผศ.ดร.ประพันธ ์ สขสมปองุ ) [email protected] 1. Intro to Communication Systems Office Hours: BKD, 6th floor of Sirindhralai building Wednesday 13:45-15:15 Friday 13:45-15:15 1 “The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point.” Shannon, Claude. A Mathematical Theory Of Communication. (1948) 2 Shannon: Father of the Info. Age Documentary Co-produced by the Jacobs School, UCSD-TV, and the California Institute for Telecommunications and Information Technology Won a Gold award in the Biography category in the 2002 Aurora Awards. 3 [http://www.uctv.tv/shows/Claude-Shannon-Father-of-the-Information-Age-6090] [http://www.youtube.com/watch?v=z2Whj_nL-x8] C. E. Shannon (1916-2001) 1938 MIT master's thesis: A Symbolic Analysis of Relay and Switching Circuits Insight: The binary nature of Boolean logic was analogous to the ones and zeros used by digital circuits. The thesis became the foundation of practical digital circuit design. The first known use of the term bit to refer to a “binary digit.” Possibly the most important, and also the most famous, master’s thesis of the century. It was simple, elegant, and important. 4 C. E. Shannon: Master Thesis 5 Boole/Shannon Celebration Events in 2015 and 2016 centered around the work of George Boole, who was born 200 years ago, and Claude E. Shannon, born 100 years ago. Events were scheduled both at the University College Cork (UCC), Ireland and the Massachusetts Institute of Technology (MIT) 6 http://www.rle.mit.edu/booleshannon/ An Interesting Book The Logician and the Engineer: How George Boole and Claude Shannon Created the Information Age by Paul J.
    [Show full text]
  • Computation of Real-Valued Functions Over the Channel in Wireless Sensor Networks
    Technische Universität München Lehrstuhl für Theoretische Informationstechnik Computation of Real-Valued Functions Over the Channel in Wireless Sensor Networks Mario Goldenbaum Vollständiger Abdruck der von der Fakultät für Elektrotechnik und Informations- technik der Technischen Universität München zur Erlangung des akademischen Grades eines Doktor-Ingenieurs (Dr. -Ing.) genehmigten Dissertation. Vorsitzender: Univ. -Prof. Dr. -Ing. habil. Dirk Wollherr Prüfer der Dissertation: 1. Univ. -Prof. Dr. -Ing. Dr. rer. nat. Holger Boche 2. Priv. -Doz. Dr. -Ing. habil. Sławomir Stańczak, Technische Universität Berlin Die Dissertation wurde am 11. 06. 2014 bei der Technischen Universität München eingereicht und durch die Fakultät für Elektrotechnik und Informationstechnik am 28. 10. 2014 angenommen. Zusammenfassung In einer Vielzahl von Sensornetzanwendungen steht nicht die Übertragung individu- eller Messwerte im Vordergrund, sondern die zuverlässige und effiziente Berechnung von Funktionen. Dabei kann es sich im Einzelnen um die Berechnung der maximalen Kohlenmonoxid-Konzentration innerhalb von Gebäuden aus Gründen der Brandschutz- überwachung handeln, um den mittleren Druck in einem Dampfkessel oder die min- imale Feuchtigkeit in einem Gewächshaus. Der klassische Ansatz zur Lösung dieser Probleme sieht vor, dass zunächst die gesamte Messwertinformation zu einem Aggrega- tionspunkt übertragen wird, der anschließend den gewünschten Funktionswert ermittelt. Um Kanalkollisionen während der Übertragung der Daten zu vermeiden, wird der Me- dienzugriff von Sensorknoten üblicherweise in der Zeit oder der Frequenz koordiniert. In der jüngeren Vergangenheit wurde gezeigt, dass diese Vorgehensweise in höchstem Maße ineffizient sein kann, da sie vollständig ignoriert, dass die primäre Aufgabe des Netzes eben nicht in der Übertragung einzelner Messwerte besteht. Insbesondere gilt, dass für die Berechnung linearer Funktionen die Ausnutzung der Interferenz anstelle deren Unterdrückung sogar zu erheblichen Performanzgewinnen führen kann.
    [Show full text]
  • Digital Communication Systems ECS 452
    Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong (ผศ.ดร.ประพันธ ์ สขสมปองุ ) [email protected] 1. Intro to Digital Communication Systems Office Hours: BKD, 6th floor of Sirindhralai building Monday 10:00-10:40 Tuesday 12:00-12:40 1 Thursday 14:20-15:30 “The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point.” Shannon, Claude. A Mathematical Theory Of Communication. (1948) 2 Shannon: Father of the Info. Age Documentary Co-produced by the Jacobs School, UCSD-TV, and the California Institute for Telecommunications and Information Technology Won a Gold award in the Biography category in the 2002 Aurora Awards. 3 [http://www.uctv.tv/shows/Claude-Shannon-Father-of-the-Information-Age-6090] [http://www.youtube.com/watch?v=z2Whj_nL-x8] C. E. Shannon (1916-2001) 1938 MIT master's thesis: A Symbolic Analysis of Relay and Switching Circuits Insight: The binary nature of Boolean logic was analogous to the ones and zeros used by digital circuits. The thesis became the foundation of practical digital circuit design. The first known use of the term bit to refer to a “binary digit.” Possibly the most important, and also the most famous, master’s thesis of the century. It was simple, elegant, and important. 4 C. E. Shannon: Master Thesis 5 Boole/Shannon Celebration Events in 2015 and 2016 centered around the work of George Boole, who was born 200 years ago, and Claude E. Shannon, born 100 years ago. Events were scheduled both at the University College Cork (UCC), Ireland and the Massachusetts Institute of Technology (MIT) 6 http://www.rle.mit.edu/booleshannon/ An Interesting Book The Logician and the Engineer: How George Boole and Claude Shannon Created the Information Age by Paul J.
    [Show full text]
  • Principles of Communications ECS 332
    Principles of Communications ECS 332 Asst. Prof. Dr. Prapun Suksompong (ผศ.ดร.ประพันธ ์ สขสมปองุ ) [email protected] 1. Intro to Communication Systems Office Hours: BKD, 6th floor of Sirindhralai building Tuesday 9:00-10:00 Wednesday 14:20-15:20 1 Thursday 9:00-10:00 “The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point.” Shannon, Claude. A Mathematical Theory Of Communication. (1948) 2 Shannon: Father of the Info. Age Documentary Co-produced by the Jacobs School, UCSD-TV, and the California Institute for Telecommunications and Information Technology Won a Gold award in the Biography category in the 2002 Aurora Awards. 3 [http://www.uctv.tv/shows/Claude-Shannon-Father-of-the-Information-Age-6090] [http://www.youtube.com/watch?v=z2Whj_nL-x8] C. E. Shannon (1916-2001) 1938 MIT master's thesis: A Symbolic Analysis of Relay and Switching Circuits Insight: The binary nature of Boolean logic was analogous to the ones and zeros used by digital circuits. The thesis became the foundation of practical digital circuit design. The first known use of the term bit to refer to a “binary digit.” Possibly the most important, and also the most famous, master’s thesis of the century. It was simple, elegant, and important. 4 C. E. Shannon: Master Thesis 5 An Interesting Book The Logician and the Engineer: How George Boole and Claude Shannon Created the Information Age by Paul J. Nahin ISBN: 9780691151007 http://press.princeton.edu/titles/ 9819.html 6 C.
    [Show full text]
  • Digital Communication Systems ECS 452
    Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong [email protected] 4. Mutual Information and Channel Capacity Office Hours: Check Google Calendar on the course website. Dr.Prapun’s Office: 6th floor of Sirindhralai building, 1 BKD Reference for this chapter Elements of Information Theory By Thomas M. Cover and Joy A. Thomas 2nd Edition (Wiley) Chapters 2, 7, and 8 1st Edition available at SIIT library: Q360 C68 1991 2 Recall: Entropy [Page 72] 3 Recall: Entropy Entropy measures the amount of uncertainty (randomness) in a RV. Three formulas for calculating entropy: [Defn 2.41] Given a pmf of a RV , ≡∑ log . Set 0log00. [2.44] Given a probability vector , ≡∑ log. [Defn 2.47] Given a number , binary entropy ≡ log 1 log 1 function [2.56] Operational meaning: Entropy of a random variable is the average length of its shortest description. 4 Recall: Entropy Important Bounds deterministic uniform The entropy of a uniform (discrete) random variable: The entropy of a Bernoulli random variable: binary entropy function 5 Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong [email protected] Information-Theoretic Quantities 6 ECS315 vs. ECS452 ECS315 ECS452 We talked about randomness but we did not We study entropy. have a quantity that formally measures the amount of randomness. Back then, we studied variance and standard deviation. We talked about independence but we did We study mutual not have a quantity that completely measures information. the amount of dependency. Back then, we studied correlation, covariance, and uncorrelated random variables. 7 Recall: ECS315 2019/1 8 Information-Theoretic Quantities Information Diagram 9 Entropy and Joint Entropy Entropy Amount of randomness in Amount of randomness in , Joint Entropy , Amount of randomness in pair In general, There might be some shared randomness between and .
    [Show full text]
  • Achievability for Discrete Memoryless Systems IT Membership and Chapters Committee Abbas El Gamal
    Acknowledgments Roberto Padovani for generous gift to the IT society Achievability for Discrete Memoryless Systems IT Membership and Chapters committee Abbas El Gamal Stanford University Summer School of IT general chairs Aylin Yener and Gerhard Kramer and the other organizers Padovani Lecture 2009 The lecture is based on Lecture Notes on Network Information Theory jointly developed with Young-Han Kim, UC San Diego A. El Gamal (Stanford University) Achievability Padovani Lecture 2009 1 / 151 A. El Gamal (Stanford University) Achievability Padovani Lecture 2009 2 / 151 Network Information Flow Problem Consider a general network information processing system: Each node observes a subset of the sources and wishes to obtain descriptions of some or all the sources, or to compute a replacements function/make a decision based on these sources Source To achieve these goals, the nodes communicate over the network Information flow questions: ◮ Communication Network Node What are the necessary and sufficient conditions on information flow in the network under which the desired information processing goals can be achieved? ◮ What are the optimal coding/computing techniques/protocols needed? The difficulty of answering these questions depends on the information processing goals, the source and communication network models, and the computational and storage capabilities of the nodes ◮ Sources may be data, speech, music, images, video, sensor data, ... ◮ Nodes may be handsets, base stations, servers, sensor nodes, ... ◮ The communication network may be wired,
    [Show full text]
  • Probabilistic Refinement of the Asymptotic Spectrum of Graphs
    Probabilistic refinement of the asymptotic spectrum of graphs P´eterVrana1,2 1Institute of Mathematics, Budapest University of Technology and Economics, Egry J´ozsefu. 1., Budapest, 1111 Hungary. 2MTA-BME Lend¨uletQuantum Information Theory Research Group March 6, 2019 Abstract The asymptotic spectrum of graphs, introduced by Zuiddam (arXiv:1807.00169, 2018), is the space of graph parameters that are additive under disjoint union, multi- plicative under the strong product, normalized and monotone under homomorphisms between the complements. He used it to obtain a dual characterization of the Shan- non capacity of graphs as the minimum of the evaluation function over the asymptotic spectrum and noted that several known upper bounds, including the Lov´asznumber and the fractional Haemers bounds are in fact elements of the asymptotic spectrum (spectral points). We show that every spectral point admits a probabilistic refinement and character- ize the functions arising in this way. This reveals that the asymptotic spectrum can be parameterized with a convex set and the evaluation function at every graph is logarith- mically convex. One consequence is that for any incomparable pair of spectral points f and g there exists a third one h and a graph G such that h(G) < minff(G); g(G)g, thus h gives a better upper bound on the Shannon capacity of G. In addition, we show that the (logarithmic) probabilistic refinement of a spectral point on a fixed graph is the entropy function associated with a convex corner. 1 Introduction The Shannon capacity of a graph G is [Sha56] q Θ(G) = lim n α(Gn); (1) n!1 where α denotes the independence number and Gn is the nth strong power (see Section 2 arXiv:1903.01857v1 [math.CO] 5 Mar 2019 for definitions).
    [Show full text]